doi: 10.3934/dcdss.2019084

Reversible hidden data access algorithm in cloud computing environment

School of Modern Posts & Institute of Modern Posts, Nanjing University of Posts and Telecommunications, Nanjing 210003, China

* Corresponding author: Jinsong Xu

Received  June 2017 Revised  November 2017 Published  November 2018

At present, the data filtering quality of reversible hidden data access algorithm based on column store database is not guaranteed, and the location accuracy and data access security of reversible hidden data are low. In this paper, the whitening vector is obtained by processing the sample length of the observed data signal. By using the nonlinear robust function, the data projection is realized, the judged threshold of projection data is constructed, an matrix with adaptive filter characteristic is set up, and the high quality of filtering results are output; the parameters between three anchor nodes and the location of reversible hidden data are measured, and the artificial bee colony optimization neural network is used for modeling and forecasting the ranging error, and determine the weights according to the results, so that on the basis of the three edge location algorithm, the positioning accuracy of the data is to further improve; through the establishment of authorized institutions, producing key, off-line encryption, online encryption, ciphertext conversion, decrypt ion and other aspects, the security of access data is completed. The experiment shows that the algorithm can effectively improve the quality of data filtering and positioning accuracy and the security of data access is also better than that of the current algorithm.

Citation: Jinsong Xu. Reversible hidden data access algorithm in cloud computing environment. Discrete & Continuous Dynamical Systems - S, doi: 10.3934/dcdss.2019084
References:
[1]

R. AfshariB. S. Gildeh and M. Sarmad, Fuzzy multiple deferred state attribute sampling plan in the presence of inspection errors, Journal of Intelligent & Fuzzy Systems, 33 (2017), 503-514.

[2]

A. BahlS. MassonZ. MalikA. J. BirtleS. SundarR. J. JonesN. D. JamesM. D. MasonS. Kumar and D. Bottomley, Final quality of life and safety data for patients with metastatic castration-resistant prostate cancer treated with cabazitaxel in the uk early access programme (eap) (nct01254279), Bju International, 116 (2015), 880-887.

[3]

A. Basar and M. Abbasi, On ordered bi-ideals in ordered-semigroups, Journal of Discrete Mathematical Sciences and Cryptography, 20 (2017), 645-652. doi: 10.1080/09720529.2015.1130474.

[4]

J. Bensmail and B. Stevens, Edge-partitioning graphs into regular and locally irregular components, Discrete Mathematics, 17 (2016), 43-58.

[5]

A. Brezavscek, S. P. and Z. A., Factors influencing the behavioural intention to use statistical software: The perspective of the slovenian students of social sciences, Eurasia Journal of Mathematics Science and Technology Education, 13 (2017), 953-986.

[6]

K. CaineS. KohnC. LawrenceR. HananiaE. M. Meslin and W. M. Tierney, Designing a patient-centered user interface for access decisions about ehr data: Implications from patient interviews., Journal of General Internal Medicine, 30 (2015), 7-16.

[7]

K. Caine and W. M. Tierney, Point and counterpoint: Patient control of access to data in their electronic health records, Journal of General Internal Medicine, 30 (2015), 38-41.

[8]

T. H. ChenW. ShangZ. M. JiangA. E. HassanM. Nasser and P. Flora, Finding and evaluating the performance impact of redundant data access for applications that are developed using object-relational mapping frameworks, IEEE Transactions on Software Engineering, 42 (2016), 1148-1161.

[9]

P. K. CommeanJ. M. RathmellK. W. ClarkD. R. Maffitt and F. W. Prior, A query tool for investigator access to the data and images of the national lung screening trial, Journal of Digital Imaging, 28 (2015), 439-447.

[10]

J. DouZ. ZhangJ. DangL. WuY. Wei and C. Sun, Properties and achievable data rate of a cyclic prefix based imperfect reconstruction filter bank multiple access system, Iet Communications, 10 (2016), 2427-2434.

[11]

W. Gao and W. Wang, A tight neighborhood union condition on fractional $(g,f,n',m)$-critical deleted graphs, Colloquium Mathematicum, 149 (2017), 291-298. doi: 10.4064/cm6959-8-2016.

[12]

P. Gope and T. Hwang, A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks, IEEE Transactions on Industrial Electronics, 63 (2016), 7124-7132.

[13]

F. Guo and T. Cheng, Systems and methods for detecting suspicious attempts to access data based on organizational relationships, 2015.

[14]

D. HuangD. HanJ. WangJ. YinX. ChenX. ZhangJ. Zhou and M. Ye, Achieving load balance for parallel data access on distributed file systems, IEEE Transactions on Computers, 67 (2018), 388-402. doi: 10.1109/TC.2017.2749229.

[15]

M. KumarN. P. GantasalaT. RoychowdhuryP. K. ThakurP. BanakarR. N. ShuklaM. G. Jones and U. Rao, De novo transcriptome sequencing and analysis of the cereal cyst nematode, heterodera avenae, Plant Molecular Biology, 1 (2015), 69-80.

[16]

Y. KwonB. Park and D. H. Kang, Scaling of data retention statistics in phase-change random access memory, IEEE Electron Device Letters, 36 (2015), 454-456.

[17]

O. LancasterT. BeckD. AtlanM. SwertzD. ThangaveluC. VealR. Dalgleish and A. J. Brookes, Cafe variome: General-purpose software for making genotype-phenotype data discoverable in restricted or open access contexts, Human Mutation, 36 (2015), 957-964.

[18]

F. LiB. Liu and J. Hong, An efficient signcryption for data access control in cloud computing, Computing, 99 (2017), 465-479. doi: 10.1007/s00607-017-0548-7.

[19]

T. L. Spires-JonesP. Poirazi and M. S. Grubb, Opening up: open access publishing, data sharing, and how they can influence your neuroscience career, European Journal of Neuroscience, 43 (2016), 1413-1419.

[20]

L. Y. WangL. ChenX. R. HaoQ. Wang and M. Ni, Life-aware buffer management algorithm for flash-based databases, Jilin Daxue Xuebao, 47 (2017), 632-638.

[21]

Z. WangD. HuangY. ZhuB. Li and C. J. Chung, Efficient attribute-based comparable data access control, IEEE Transactions on Computers, 64 (2015), 3430-3443. doi: 10.1109/TC.2015.2401033.

[22]

D. T. Wiriaatmadja and K. W. Choi, Hybrid random access and data transmission protocol for machine-to-machine communications in cellular networks, IEEE Transactions on Wireless Communications, 14 (2015), 33-46.

[23]

F. Y. Wu, Remote sensing image processing based on multi-scale geometric transformation algorithm, Journal of Discrete Mathematical Sciences & Cryptography, 20 (2017), 309-321.

[24]

J. Xu, Data distributed momdatory secure access method in cloud computing environment, Bulletin of Science & Technology, 8 (2017), 189-192.

[25]

T. Yin, The exploration and research of software development architecture based on asp.net mvc pattern, Journal of China Academy of Electronics & Information Technology, 599-602.

[26]

J. Zhang, Simulation of database access information security management under big data platform, Computer Simulation, 7.

show all references

References:
[1]

R. AfshariB. S. Gildeh and M. Sarmad, Fuzzy multiple deferred state attribute sampling plan in the presence of inspection errors, Journal of Intelligent & Fuzzy Systems, 33 (2017), 503-514.

[2]

A. BahlS. MassonZ. MalikA. J. BirtleS. SundarR. J. JonesN. D. JamesM. D. MasonS. Kumar and D. Bottomley, Final quality of life and safety data for patients with metastatic castration-resistant prostate cancer treated with cabazitaxel in the uk early access programme (eap) (nct01254279), Bju International, 116 (2015), 880-887.

[3]

A. Basar and M. Abbasi, On ordered bi-ideals in ordered-semigroups, Journal of Discrete Mathematical Sciences and Cryptography, 20 (2017), 645-652. doi: 10.1080/09720529.2015.1130474.

[4]

J. Bensmail and B. Stevens, Edge-partitioning graphs into regular and locally irregular components, Discrete Mathematics, 17 (2016), 43-58.

[5]

A. Brezavscek, S. P. and Z. A., Factors influencing the behavioural intention to use statistical software: The perspective of the slovenian students of social sciences, Eurasia Journal of Mathematics Science and Technology Education, 13 (2017), 953-986.

[6]

K. CaineS. KohnC. LawrenceR. HananiaE. M. Meslin and W. M. Tierney, Designing a patient-centered user interface for access decisions about ehr data: Implications from patient interviews., Journal of General Internal Medicine, 30 (2015), 7-16.

[7]

K. Caine and W. M. Tierney, Point and counterpoint: Patient control of access to data in their electronic health records, Journal of General Internal Medicine, 30 (2015), 38-41.

[8]

T. H. ChenW. ShangZ. M. JiangA. E. HassanM. Nasser and P. Flora, Finding and evaluating the performance impact of redundant data access for applications that are developed using object-relational mapping frameworks, IEEE Transactions on Software Engineering, 42 (2016), 1148-1161.

[9]

P. K. CommeanJ. M. RathmellK. W. ClarkD. R. Maffitt and F. W. Prior, A query tool for investigator access to the data and images of the national lung screening trial, Journal of Digital Imaging, 28 (2015), 439-447.

[10]

J. DouZ. ZhangJ. DangL. WuY. Wei and C. Sun, Properties and achievable data rate of a cyclic prefix based imperfect reconstruction filter bank multiple access system, Iet Communications, 10 (2016), 2427-2434.

[11]

W. Gao and W. Wang, A tight neighborhood union condition on fractional $(g,f,n',m)$-critical deleted graphs, Colloquium Mathematicum, 149 (2017), 291-298. doi: 10.4064/cm6959-8-2016.

[12]

P. Gope and T. Hwang, A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks, IEEE Transactions on Industrial Electronics, 63 (2016), 7124-7132.

[13]

F. Guo and T. Cheng, Systems and methods for detecting suspicious attempts to access data based on organizational relationships, 2015.

[14]

D. HuangD. HanJ. WangJ. YinX. ChenX. ZhangJ. Zhou and M. Ye, Achieving load balance for parallel data access on distributed file systems, IEEE Transactions on Computers, 67 (2018), 388-402. doi: 10.1109/TC.2017.2749229.

[15]

M. KumarN. P. GantasalaT. RoychowdhuryP. K. ThakurP. BanakarR. N. ShuklaM. G. Jones and U. Rao, De novo transcriptome sequencing and analysis of the cereal cyst nematode, heterodera avenae, Plant Molecular Biology, 1 (2015), 69-80.

[16]

Y. KwonB. Park and D. H. Kang, Scaling of data retention statistics in phase-change random access memory, IEEE Electron Device Letters, 36 (2015), 454-456.

[17]

O. LancasterT. BeckD. AtlanM. SwertzD. ThangaveluC. VealR. Dalgleish and A. J. Brookes, Cafe variome: General-purpose software for making genotype-phenotype data discoverable in restricted or open access contexts, Human Mutation, 36 (2015), 957-964.

[18]

F. LiB. Liu and J. Hong, An efficient signcryption for data access control in cloud computing, Computing, 99 (2017), 465-479. doi: 10.1007/s00607-017-0548-7.

[19]

T. L. Spires-JonesP. Poirazi and M. S. Grubb, Opening up: open access publishing, data sharing, and how they can influence your neuroscience career, European Journal of Neuroscience, 43 (2016), 1413-1419.

[20]

L. Y. WangL. ChenX. R. HaoQ. Wang and M. Ni, Life-aware buffer management algorithm for flash-based databases, Jilin Daxue Xuebao, 47 (2017), 632-638.

[21]

Z. WangD. HuangY. ZhuB. Li and C. J. Chung, Efficient attribute-based comparable data access control, IEEE Transactions on Computers, 64 (2015), 3430-3443. doi: 10.1109/TC.2015.2401033.

[22]

D. T. Wiriaatmadja and K. W. Choi, Hybrid random access and data transmission protocol for machine-to-machine communications in cellular networks, IEEE Transactions on Wireless Communications, 14 (2015), 33-46.

[23]

F. Y. Wu, Remote sensing image processing based on multi-scale geometric transformation algorithm, Journal of Discrete Mathematical Sciences & Cryptography, 20 (2017), 309-321.

[24]

J. Xu, Data distributed momdatory secure access method in cloud computing environment, Bulletin of Science & Technology, 8 (2017), 189-192.

[25]

T. Yin, The exploration and research of software development architecture based on asp.net mvc pattern, Journal of China Academy of Electronics & Information Technology, 599-602.

[26]

J. Zhang, Simulation of database access information security management under big data platform, Computer Simulation, 7.

Figure 1.  principle of reversible hidden data location
Figure 2.  working principle of three edge location method
Figure 3.  reversible hidden data's access control entities in the cloud computing environment
Figure 4.  Distribution model of reversible hidden data node in cloud computing environment
Figure 5.  Comparison of the filtering effects by different algorithms
Figure 6.  Comparison of location effect of reversible hidden data by different algorithms
Figure 7.  Comparison of access security for reversible hidden data by different algorithms
[1]

Min Zhang, Gang Li. Multi-objective optimization algorithm based on improved particle swarm in cloud computing environment. Discrete & Continuous Dynamical Systems - S, 2018, 0 (0) : 1413-1426. doi: 10.3934/dcdss.2019097

[2]

Kyosuke Hashimoto, Hiroyuki Masuyama, Shoji Kasahara, Yutaka Takahashi. Performance analysis of backup-task scheduling with deadline time in cloud computing. Journal of Industrial & Management Optimization, 2015, 11 (3) : 867-886. doi: 10.3934/jimo.2015.11.867

[3]

Weidong Bao, Haoran Ji, Xiaomin Zhu, Ji Wang, Wenhua Xiao, Jianhong Wu. ACO-based solution for computation offloading in mobile cloud computing. Big Data & Information Analytics, 2016, 1 (1) : 1-13. doi: 10.3934/bdia.2016.1.1

[4]

Tsuguhito Hirai, Hiroyuki Masuyama, Shoji Kasahara, Yutaka Takahashi. Performance optimization of parallel-distributed processing with checkpointing for cloud environment. Journal of Industrial & Management Optimization, 2018, 14 (4) : 1423-1442. doi: 10.3934/jimo.2018014

[5]

Tsuguhito Hirai, Hiroyuki Masuyama, Shoji Kasahara, Yutaka Takahashi. Performance analysis of large-scale parallel-distributed processing with backup tasks for cloud computing. Journal of Industrial & Management Optimization, 2014, 10 (1) : 113-129. doi: 10.3934/jimo.2014.10.113

[6]

Michael Krause, Jan Marcel Hausherr, Walter Krenkel. Computing the fibre orientation from Radon data using local Radon transform. Inverse Problems & Imaging, 2011, 5 (4) : 879-891. doi: 10.3934/ipi.2011.5.879

[7]

Santanu Sarkar. Analysis of Hidden Number Problem with Hidden Multiplier. Advances in Mathematics of Communications, 2017, 11 (4) : 805-811. doi: 10.3934/amc.2017059

[8]

F. D. Araruna, F. O. Matias, M. P. Matos, S. M. S. Souza. Hidden regularity for the Kirchhoff equation. Communications on Pure & Applied Analysis, 2008, 7 (5) : 1049-1056. doi: 10.3934/cpaa.2008.7.1049

[9]

Joanna Tyrcha, John Hertz. Network inference with hidden units. Mathematical Biosciences & Engineering, 2014, 11 (1) : 149-165. doi: 10.3934/mbe.2014.11.149

[10]

Wolfgang Wagner. A random cloud model for the Wigner equation. Kinetic & Related Models, 2016, 9 (1) : 217-235. doi: 10.3934/krm.2016.9.217

[11]

Miguel Atencia, Esther García-Garaluz, Gonzalo Joya. The ratio of hidden HIV infection in Cuba. Mathematical Biosciences & Engineering, 2013, 10 (4) : 959-977. doi: 10.3934/mbe.2013.10.959

[12]

Juan Luis Vázquez, Nikolaos B. Zographopoulos. Hardy type inequalities and hidden energies. Discrete & Continuous Dynamical Systems - A, 2013, 33 (11&12) : 5457-5491. doi: 10.3934/dcds.2013.33.5457

[13]

Xu Zhang, Guanrong Chen. Polynomial maps with hidden complex dynamics. Discrete & Continuous Dynamical Systems - B, 2017, 22 (11) : 1-14. doi: 10.3934/dcdsb.2018293

[14]

Oscar Patterson-Lomba, Muntaser Safan, Sherry Towers, Jay Taylor. Modeling the role of healthcare access inequalities in epidemic outcomes. Mathematical Biosciences & Engineering, 2016, 13 (5) : 1011-1041. doi: 10.3934/mbe.2016028

[15]

Motahhareh Gharahi, Massoud Hadian Dehkordi. Average complexities of access structures on five participants. Advances in Mathematics of Communications, 2013, 7 (3) : 311-317. doi: 10.3934/amc.2013.7.311

[16]

Alexis De Vos, Yvan Van Rentergem. Young subgroups for reversible computers. Advances in Mathematics of Communications, 2008, 2 (2) : 183-200. doi: 10.3934/amc.2008.2.183

[17]

Paul H. Rabinowitz. On a class of reversible elliptic systems. Networks & Heterogeneous Media, 2012, 7 (4) : 927-939. doi: 10.3934/nhm.2012.7.927

[18]

S. Aiello, Luigi Barletti, Aldo Belleni-Morante. Identification of photon sources, stochastically embedded in an interstellar cloud. Kinetic & Related Models, 2009, 2 (3) : 425-432. doi: 10.3934/krm.2009.2.425

[19]

Wolfgang Wagner. A random cloud model for the Schrödinger equation. Kinetic & Related Models, 2014, 7 (2) : 361-379. doi: 10.3934/krm.2014.7.361

[20]

James C. Robinson. Computing inertial manifolds. Discrete & Continuous Dynamical Systems - A, 2002, 8 (4) : 815-833. doi: 10.3934/dcds.2002.8.815

2017 Impact Factor: 0.561

Metrics

  • PDF downloads (2)
  • HTML views (71)
  • Cited by (0)

Other articles
by authors

[Back to Top]